000 03559cam a2200577Ii 4500
001 ocn910662542
003 OCoLC
005 20190328114811.0
006 m o d
007 cr cnu|||unuuu
008 150604s2015 mau ob 001 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dCUS
_dEBLCP
_dN$T
_dOPELS
_dOCLCO
_dIDEBK
_dYDXCP
_dE7B
_dDEBSZ
_dOCLCO
_dUIU
_dOCLCO
_dCDX
_dCOO
_dOCLCO
_dSTF
_dB24X7
_dD6H
_dZ5A
_dVT2
_dLIV
_dOCLCQ
_dU3W
_dOCLCF
_dOCLCQ
_dWYU
_dOCLCO
019 _a934503252
_a988657789
_a993505315
_a1008950458
_a1066594645
020 _a9780128017807
_q(electronic bk.)
020 _a0128017805
_q(electronic bk.)
020 _a0128015950
020 _a9780128015957
020 _z9780128015957
035 _a(OCoLC)910662542
_z(OCoLC)934503252
_z(OCoLC)988657789
_z(OCoLC)993505315
_z(OCoLC)1008950458
_z(OCoLC)1066594645
050 4 _aQA76.585
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
245 0 4 _aThe cloud security ecosystem : technical, legal, business and management issues /
_h[electronic resource]
_cedited by Ryan Ko, Kim-Kwang Raymond Choo.
264 1 _aWaltham, MA :
_bSyngress,
_c2015
264 4 _c�2015
300 _a1 online resource (530 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references and index.
588 0 _aVendor-supplied metadata.
505 0 _aPart 1. Plan: threats, risk, and requirement landscape -- Part 2. Do: cloud security approaches and challenges -- Part 3. Check: forensics and incident response -- Part 4. Act: governance and auditing.
520 _aThis book discusses cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. It presents the most current research on cloud security from a multi-disciplinary standpoint focusing on technical, legal, and business management issues involved in implementing effective cloud security, including case examples. Other topics include: cloud trust protocols; cryptographic deployment; mobile devices and BYOD security management; auditability and accountability; emergency and incident response; cloud forensics; cloud data governance; mitigation and liability of international cloud deployment; legal boundaries; risk management; cloud information security management plans; economics of cloud security; standardization efforts. --
_cEdited summary from book.
650 0 _aCloud computing
_xSecurity measures.
650 0 _aInformation technology
_xSecurity measures.
650 0 _aData protection.
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aData protection.
_2fast
_0(OCoLC)fst00887958
650 7 _aInformation technology
_xSecurity measures.
_2fast
_0(OCoLC)fst00973129
650 7 _aDatormoln
_xs�akerhetsaspekter.
_2sao
655 4 _aElectronic books.
655 0 _aElectronic book.
700 1 _aKo, Ryan,
_eeditor.
700 1 _aChoo, Raymond,
_eeditor.
776 0 8 _iPrint version:
_tCloud security ecosystem : technical, legal, business and management issues.
_dAmsterdam, [Netherlands] : Syngress, �2015
_hxxxix, 530 pages
_z9780128015957
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128015957
999 _c247097
_d247097